<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">
Tag: website-security

New Signatures Released to Counter Polyfill[.]io Supply Chain Attack

IM_polyfill

Dear Valued Customers,

We want to inform you about a critical security issue affecting the widely-used Polyfill JavaScript library and to update you on the measures Imunify360 has taken to protect you.

Balancing Security and Ads on Your Website: What You Need to Know

Balancing Security and Ads on Your Website

In today's digital landscape, monetizing websites through ads has become a standard practice, but it comes with security trade-offs.

WordPress Security Fundamentals: Ultimate Guide 2023

WordPress Security Fundamentals: Ultimate Guide 2023

The WordPress content management system or (CMS) is one of the most popular web applications on the market. It’s estimated that WordPress powers almost 43% of the internet, up from 30% just a few years ago. The foundation for the content management system’s success is its convenience, simple installation, and vast theme and plugin community. WordPress can be used by someone who has very little knowledge of the ways a web application functions, but it comes at the expense of security. The article covers the following topics:

Shared Hosting Security Guide for 2021

shared-hosting-security-guide-for-2021Shared hosting is beneficial for small hobby sites and personal blogs, but businesses might find that shared hosting limits growth. To start out, however, many site owners begin with shared hosting until their business grows and makes enough to justify paying for virtual private servers or dedicated hosting. For web hosting providers, it’s critical that servers run at optimal speeds and don’t harbor any malware. Security can be complex when hundreds of site owners with little knowledge of performance tuning and cybersecurity install applications on the shared server. With the right tools, site owners and administrators can keep their servers running at peak performance and keep them secure from common exploits. Keep on reading to find the answers to the following questions:

How Create.com Leveraged Imunify360 to Preserve Customer Website Ranking

How-Create.com-Leveraged-Imunify360-to-Preserve-Customer-Website-Search-Ranking

Ranking in search engine results is a valuable marketing tool for organizations, and losing this ranking can directly affect revenue. Search engines do what is best for their users, and one of those strategies is to remove hacked sites and those hosting malware. Google has its own scanner that detects hacked sites, but many site owners are unaware they’ve been hacked until they realize that they no longer receive search engine traffic to their sites. To help site owners fight threat actors and protect sites, shared hoster Create.com uses Imunify360 to detect, stop, and clean malicious content.

“Adicionar Banco Inter ao WooCommerce” WordPress Plugin with Malware

Adicionar-Banco-Inter-ao-WooCommerce-WordPress-Plugin-with-Malware

As part of Imunify360’s proactive malware research activities, we recently identified that a plugin named Adicionar Banco Inter ao WooCommerce from WordPress repository, which can be used to identify malware in web servers, indeed had active malware inside one of the plugin’s source files.

How to Keep Your Website Secure in 2021

How-to-Keep-Your-Website-Secure-in-2021

During the pandemic lockdowns, many businesses went from office work to an at-home workforce. Studies show that a huge uptick in cyber-attacks started in 2020 after pandemic lockdowns, which means that more attackers were scanning and searching for exploits on web servers. A web server with poor security controls, outdated software, misconfigurations, and overall lack of administration could be subject to numerous cyber-attacks and exploits. 

Configuring brute force protection in Imunify360

Configuring-brute-force-protection-in-Imunify360


Brute-force attacks are the most widely used cyber-attacks in the cyber-sphere. And dependent on the target, the protection method is unique to the attack. There are two main types of brute-force attacks:

  • Service level brute-force, targeting ssh, ftp, smtp services and others.
  • Web application level brute-force, e.g. attacks against WordPress, Magento, and similar CMSes and web-scripts.

Why Malware on Your Website Should Never Be Ignored

why-malware-should-never-be-ignored

For website owners unfamiliar with common malware, having malware on your site that doesn’t  cause any obvious issues is seemingly harmless to the site owner. How bad can malware be if it just injects links? If site owners do not understand the repercussions of malware, then they will not take it seriously. It often means that these site owners don’t have the necessary monitoring and malware protection in place to defend sites. For shared hosting providers, this issue can have severe consequences and long-term effects on the server’s reputation and potential profitability. Additionally, read our website hosting security article and learn how to keep your website secure in 2021.

A post-hack survival guide: cleaning your website after being hacked

b2ap3_large_survival-guide

Very often, web hosting administrators start to take security measures only after a website has been hacked. So, let us imagine the situation when ImunifyAV has been installed on such an infected server. All malware has been cleaned in one click, and all malicious activity has been stopped.

Subscribe to Imunify security Newsletter